Analysis
-
max time kernel
111s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2025, 20:47 UTC
Static task
static1
Behavioral task
behavioral1
Sample
108157b630b72f3fc9aabf53318b9f710dcf6ee0badddecee3919d8375d42f23N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
108157b630b72f3fc9aabf53318b9f710dcf6ee0badddecee3919d8375d42f23N.exe
Resource
win10v2004-20241007-en
General
-
Target
108157b630b72f3fc9aabf53318b9f710dcf6ee0badddecee3919d8375d42f23N.exe
-
Size
58KB
-
MD5
907804d825ee87103aaaf1a7cca28dc0
-
SHA1
2de2daf6a7b7833937cc0a03d10d8de2809cd76e
-
SHA256
108157b630b72f3fc9aabf53318b9f710dcf6ee0badddecee3919d8375d42f23
-
SHA512
2330604e614006e8d6281ed59027691892c6774eb1f45ca99cdf979df972a8a1d52740c3d4758b770655d3229e742cd896346957572120306c317deb497c0394
-
SSDEEP
1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ/z:iEoIlwIguEA4c5DgA9DOyq0eF7
Malware Config
Signatures
-
Sakula family
-
Sakula payload 4 IoCs
resource yara_rule behavioral2/memory/2988-5-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/4188-7-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/2988-13-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/4188-17-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 108157b630b72f3fc9aabf53318b9f710dcf6ee0badddecee3919d8375d42f23N.exe -
Executes dropped EXE 1 IoCs
pid Process 4188 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 108157b630b72f3fc9aabf53318b9f710dcf6ee0badddecee3919d8375d42f23N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 108157b630b72f3fc9aabf53318b9f710dcf6ee0badddecee3919d8375d42f23N.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5024 cmd.exe 4724 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4724 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2988 108157b630b72f3fc9aabf53318b9f710dcf6ee0badddecee3919d8375d42f23N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2988 wrote to memory of 4188 2988 108157b630b72f3fc9aabf53318b9f710dcf6ee0badddecee3919d8375d42f23N.exe 82 PID 2988 wrote to memory of 4188 2988 108157b630b72f3fc9aabf53318b9f710dcf6ee0badddecee3919d8375d42f23N.exe 82 PID 2988 wrote to memory of 4188 2988 108157b630b72f3fc9aabf53318b9f710dcf6ee0badddecee3919d8375d42f23N.exe 82 PID 2988 wrote to memory of 5024 2988 108157b630b72f3fc9aabf53318b9f710dcf6ee0badddecee3919d8375d42f23N.exe 91 PID 2988 wrote to memory of 5024 2988 108157b630b72f3fc9aabf53318b9f710dcf6ee0badddecee3919d8375d42f23N.exe 91 PID 2988 wrote to memory of 5024 2988 108157b630b72f3fc9aabf53318b9f710dcf6ee0badddecee3919d8375d42f23N.exe 91 PID 5024 wrote to memory of 4724 5024 cmd.exe 93 PID 5024 wrote to memory of 4724 5024 cmd.exe 93 PID 5024 wrote to memory of 4724 5024 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\108157b630b72f3fc9aabf53318b9f710dcf6ee0badddecee3919d8375d42f23N.exe"C:\Users\Admin\AppData\Local\Temp\108157b630b72f3fc9aabf53318b9f710dcf6ee0badddecee3919d8375d42f23N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4188
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\108157b630b72f3fc9aabf53318b9f710dcf6ee0badddecee3919d8375d42f23N.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4724
-
-
Network
-
Remote address:8.8.8.8:53Requestcitrix.vipreclod.comIN AResponse
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request17.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestcitrix.vipreclod.comIN AResponse
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.163.245.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request182.129.81.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestcitrix.vipreclod.comIN AResponse
-
Remote address:8.8.8.8:53Requestcitrix.vipreclod.comIN AResponse
-
66 B 134 B 1 1
DNS Request
citrix.vipreclod.com
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
17.160.190.20.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
-
66 B 134 B 1 1
DNS Request
citrix.vipreclod.com
-
73 B 147 B 1 1
DNS Request
133.211.185.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
56.163.245.4.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
72 B 147 B 1 1
DNS Request
182.129.81.91.in-addr.arpa
-
66 B 134 B 1 1
DNS Request
citrix.vipreclod.com
-
66 B 134 B 1 1
DNS Request
citrix.vipreclod.com
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD51111b62281181183d81c29c6dd1d524a
SHA198cdf71774e486bfaac32d2719c2a8fd2c6d2024
SHA25677c563c0f997f525409f7c063a05ec6bfb684c12938dd0dec3429182fc1c8404
SHA512c4e853476483b3bcbe21295205c5f0124865c477a78b856b51ec83ef38e6061618751eafe2d9026d518592e522a6d7d77429443579c5c61729d49d0343723a93